Brand Post

About the Author Brand Post


BrandPost: Huawei and Partners Launch New Retail Solution at Eco-Connect

Huawei, a leading global information and communications technology (ICT) solution provider, announced the launch of its New Retail solution together with partners Century, Ontme, Keonn and CipherLab at Huawei Eco-Connect Europe 2017 in Berlin.

Developed in conjunction with Huawei eco-system partners, the New Retail solution builds on Huawei’s IoT and Cloud solution portfolio. The New Retail solution enables retailers to make use of data gathered at every stage of the value chain, and thus create a digital in-store experience facilitating closer customer engagement. As a result, it helps retailers to increase sales and achieve better overall management efficiency.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: Huawei and Partners Launch New Retail Solution at Eco-Connect

Huawei, a leading global information and communications technology (ICT) solution provider, announced the launch of its New Retail solution together with partners Century, Ontme, Keonn and CipherLab at Huawei Eco-Connect Europe 2017 in Berlin.

Developed in conjunction with Huawei eco-system partners, the New Retail solution builds on Huawei’s IoT and Cloud solution portfolio. The New Retail solution enables retailers to make use of data gathered at every stage of the value chain, and thus create a digital in-store experience facilitating closer customer engagement. As a result, it helps retailers to increase sales and achieve better overall management efficiency.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: Huawei Champions Open Ecosystems at Eco-Connect Europe 2017

Huawei, a leading global information and communications technology (ICT) solutions provider, celebrated the power of open ecosystems and collaborative ICT at this year’s Huawei Eco-Connect Europe, in Berlin. Under the theme of “Go Digital – Go Cloud” Huawei’s flagship event in Europe emphasized the need to create and shape an open, innovative ICT ecosystem to empower the digital transformation of European businesses.

“Digital transformation is no longer a future trend; it’s happening now, but digital transformation cannot be done by one single company, or organization, alone.” Vincent Pang, President of Western European Region, Huawei commented, “As a reliable digital infrastructure innovator and enabler, Huawei aims to build an open platform in Europe and globally, leading to closer collaboration across the digital industry. This platform will inspire cross-industry innovation, create a digital culture, and bring clear value to European communities and enterprises. And this is why we held the Eco-Connect Conference with our partners.”

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: Huawei Champions Open Ecosystems at Eco-Connect Europe 2017

Huawei, a leading global information and communications technology (ICT) solutions provider, celebrated the power of open ecosystems and collaborative ICT at this year’s Huawei Eco-Connect Europe, in Berlin. Under the theme of “Go Digital – Go Cloud” Huawei’s flagship event in Europe emphasized the need to create and shape an open, innovative ICT ecosystem to empower the digital transformation of European businesses.

“Digital transformation is no longer a future trend; it’s happening now, but digital transformation cannot be done by one single company, or organization, alone.” Vincent Pang, President of Western European Region, Huawei commented, “As a reliable digital infrastructure innovator and enabler, Huawei aims to build an open platform in Europe and globally, leading to closer collaboration across the digital industry. This platform will inspire cross-industry innovation, create a digital culture, and bring clear value to European communities and enterprises. And this is why we held the Eco-Connect Conference with our partners.”

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: Demand for Choice Fuels ‘PC Renaissance’

These days, workers have access to more devices than ever smartphones, tablets, and others. Despite this ever-expanding fleet, the PC remains the backbone of enterprise computing power. Kaitlin Murphy, director of marketing for business clients at Intel, sees the PC as a key driver toward an organization’s productivity and digital transformation.

Q: How significant is equipping an organization’s workforce with updated PCs and laptops to driving the organization’s digital transformation?

A: The PC is at the center of this digital transformation. If you look at what knowledge workers interact with on a daily basis, the number one tool they use—it’s the PC.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: The Endpoint Imperative: A Podcast Series from Intel

Fast-evolving trends are changing the way IT thinks about security. To stay secure and productive, IT operations must excel at the fundamentals: PC refreshes for security, and optimizing end-user computers with Microsoft Windows 10. In “The Endpoint Imperative,” a podcast series from Intel, learn from the experts how hardware and software together make for optimized security.

Listen to the first episode:

https://soundcloud.com/user-3402819/the-end-point-imperative-ep-1-it-spending-setting-priorities-in-a-volatile-world?in=user-3402819/sets/the-end-point-imperative-a

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: Should Your Enterprise Perimeter Live in the Cloud?

As enterprises embrace cloud computing and a mobile workforce, IT leaders have watched the traditional network perimeter capabilities dissolve, making security, access and identity concerns a top priority.

Digital ecosystems have expanded the infrastructure horizon for enterprises far beyond the network perimeter. Increasingly applications reside in the cloud, erasing the traditional idea of “inside” and “outside” a network perimeter. And while the idea of a “cloud perimeter” is emerging, protecting data your enterprise in requires a new approach to security that moves from the “moat and castle” approach to a zero trust model.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: State of Remote Access Security

Nearly three-quarters of the U.S. workforce will be mobile workers by 2023, IDC predicts. With so many employees on the road at least part of the time, being able to access business critical applications remotely is key to the way we work — but also hard to secure.

In a recent study conducted by IDC for Akamai, more than half of respondents (56%) ranked security breaches as their greatest challenge around application access, even as they acknowledged that providing that level of access is an absolute necessity. Indeed, more than half the companies surveyed said every aspect of securing access is difficult, from managing mobile employees to onboarding and off-boarding contractors and partners.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: DNS: Early Warning System for Cyber Attacks

The Domain Name System (DNS) is akin to the central exchange for the Internet. It lists, tracks, and matches domain names – like www.akamai.com — to machine-readable IP addresses – like 23.199.214.34 — to steer traffic to the desired site.

But security wasn’t top of mind in the design of the DNS protocol. As such, it should come as no surprise that DNS-based threats continue to stalk the digital world. In fact, DNS is one of the top three most frequently used attack vectors to date this year, according to Akamai’s First Quarter, 2017 State of the Internet / Security Report.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: DNS and Security: A Vulnerability, Yes. But Also A Safeguard

Every action on the Internet relies on the Domain Name System (DNS), which lists, tracks, and matches domain names to machine-readable IP addresses to make sure traffic gets where it’s meant to go. Because it’s such a basic part of the Internet, many organizations take it for granted—and that’s made the world’s 30 to 50 million DNS servers an increasingly popular cyber attack vector.

A recursive DNS server’s only function is to resolve user requests. It has no way of knowing whether the connection it enables is good or bad. At many enterprises, firewalls do not inspect the port that DNS servers use to listen for queries. Often, the default firewall configuration is to allow inbound DNS requests from the public Internet so that a DNS service can respond.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: The VPN is Dead; Long Live the VPN!

For years, virtual private networks (VPNs) have been the best practice for giving remote workers secure access to corporate data and applications. But VPNs are built on the fundamental idea that enterprises have an inside and an outside—and the more operations your organization moves to the cloud and the more your users are accessing things remotely, the more difficult it’s becoming to define what “inside” and “outside” even mean.

How do you provide secure access to your enterprise network when it’s effectively scattered across the Internet?

A recent IDC survey indicates this concern is weighing on companies in every industry. More than 80% of the companies surveyed feel providing remote access is important, and most expect their use of remote access will grow by 11% to 20% in the next year or two.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: The VPN is Dead; Long Live the VPN!

For years, virtual private networks (VPNs) have been the best practice for giving remote workers secure access to corporate data and applications. But VPNs are built on the fundamental idea that enterprises have an inside and an outside—and the more operations your organization moves to the cloud and the more your users are accessing things remotely, the more difficult it’s becoming to define what “inside” and “outside” even mean.

How do you provide secure access to your enterprise network when it’s effectively scattered across the Internet?

A recent IDC survey indicates this concern is weighing on companies in every industry. More than 80% of the companies surveyed feel providing remote access is important, and most expect their use of remote access will grow by 11% to 20% in the next year or two.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: The Biggest Access Security Challenges and How to Address Them

As companies’ global partner ecosystems expand, remote suppliers, contractors and other external parties are just as likely to require access to some key enterprise applications as are full-time staffers working from branch locations, home offices or the field.

With the lines continuing to blur between who is inside the enterprise and who’s outside it, and control over end points diminishing, the challenge for IT to deliver secure access to applications that reside behind firewalls and across multiple private and public clouds grows larger.  

Here are some of the application access security dilemmas your own IT team may confront, especially when relying on traditional access approaches:

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: How Content Delivery Expertise Can Empower Better Security

The push for enterprises to be more agile, flexible, and fast—a.k.a. Digital Transformation—is driving IT resources out of legacy environments and into the cloud.

Business today depends upon a more flexible, remote and mobile workforce, and that workforce needs secure, reliable, and fast access to those resources and applications that live in the cloud.

But the transformation to an inside-out enterprise—where applications, data and users increasingly live beyond a company’s confines—imposes some challenges along with the benefits it brings.

At the top of those issues: security. IT remains responsible for the security, visibility, and performance of applications and users that now sit outside the business’ traditional zone of control. Three-quarters of respondents [1] to a recent IDC survey say that the ability to provide secure remote application access is a priority.

To read this article in full or to leave a comment, please click here

Read more 0 Comments